henry pushed to branch tor-browser-149.0a1-16.0-2 at The Tor Project / Applications / Tor Browser
Commits:
-
bddfb109
by Henry Wilkes at 2026-04-16T16:25:52+00:00
-
184592ac
by Henry Wilkes at 2026-04-16T16:25:52+00:00
-
112b814b
by Henry Wilkes at 2026-04-16T16:25:52+00:00
-
8956c706
by Henry Wilkes at 2026-04-16T16:25:52+00:00
4 changed files:
- browser/base/content/browser-siteIdentity.js
- build/moz.configure/torbrowser-resources.configure
- mobile/android/fenix/app/src/main/java/org/mozilla/fenix/home/intent/HomeDeepLinkIntentProcessor.kt
- mobile/android/geckoview/src/main/java/org/mozilla/geckoview/TorAndroidIntegration.java
Changes:
| ... | ... | @@ -929,7 +929,6 @@ var gIdentityHandler = { |
| 929 | 929 | uriIsOnionHost ? "onionMixedDisplayContent" : "mixedDisplayContent"
|
| 930 | 930 | );
|
| 931 | 931 | } else {
|
| 932 | - // TODO: ignore weak https cipher for onionsites?
|
|
| 933 | 932 | this._identityBox.classList.add("weakCipher");
|
| 934 | 933 | }
|
| 935 | 934 | } else if (this._isCertErrorPage) {
|
| ... | ... | @@ -24,7 +24,6 @@ option( |
| 24 | 24 | def tor_expert_bundle(value, mozbuild_state_path, _bootstrapped):
|
| 25 | 25 | if value:
|
| 26 | 26 | path = Path(value[0])
|
| 27 | - # TODO: Do a more thorough check on the directory.
|
|
| 28 | 27 | if path.is_dir():
|
| 29 | 28 | return value[0]
|
| 30 | 29 | else:
|
| ... | ... | @@ -133,10 +133,6 @@ class HomeDeepLinkIntentProcessor( |
| 133 | 133 | }
|
| 134 | 134 | if (BuildConfig.DEEP_LINK_SCHEME.startsWith("torbrowser")) {
|
| 135 | 135 | // tor-browser#42578
|
| 136 | - // TODO:
|
|
| 137 | - // Maybe just warn users about linkability but
|
|
| 138 | - // give them the choice to open anyway, once
|
|
| 139 | - // the other deep link related issues are fixed.
|
|
| 140 | 136 | logger.info("Tor Browser rejects open intent deep link: $deepLink")
|
| 141 | 137 | return
|
| 142 | 138 | }
|
| ... | ... | @@ -148,7 +148,14 @@ public class TorAndroidIntegration implements BundleEventListener { |
| 148 | 148 | } else if (EVENT_SETTINGS_CHANGED.equals(event)) {
|
| 149 | 149 | GeckoBundle newSettings = message.getBundle("settings");
|
| 150 | 150 | if (newSettings != null) {
|
| 151 | - // TODO: Should we notify listeners?
|
|
| 151 | + // NOTE: We assume that we do not need to notify any consumer with the
|
|
| 152 | + // new state because we expect the relevant consumers to read the latest
|
|
| 153 | + // state regularly (e.g. each time the settings screen is opened), and
|
|
| 154 | + // we only expect one active consumer at any given moment (only one
|
|
| 155 | + // setting screen is shown) which means that the single consumer can
|
|
| 156 | + // reflect any *expected* individual changes in the UI prior to this
|
|
| 157 | + // confirmation signal, and there are no other consumers that need to be
|
|
| 158 | + // synchronised with this change. See tor-browser#42384.
|
|
| 152 | 159 | mSettings = new TorSettings(newSettings);
|
| 153 | 160 | } else {
|
| 154 | 161 | Log.w(TAG, "Ignoring a settings changed event that did not have the new settings.");
|
| ... | ... | @@ -345,7 +352,7 @@ public class TorAndroidIntegration implements BundleEventListener { |
| 345 | 352 | data.putInt("status", 0xdeadbeef);
|
| 346 | 353 | }
|
| 347 | 354 | // FIXME: We usually don't reach this when the application is killed!
|
| 348 | - // So, we don't do our cleanup.
|
|
| 355 | + // So, we don't do our cleanup. Investigation in tor-browser#44861.
|
|
| 349 | 356 | Log.i(TAG, "Tor process " + mHandle + " has exited.");
|
| 350 | 357 | EventDispatcher.getInstance().dispatch(EVENT_TOR_EXITED, data);
|
| 351 | 358 | }
|